Skip to main content

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography.

Project description

# Steg

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography. Current supported image formats include PNG, TIFF, BMP, and ICO.
Steg also includes a command line tool for quick hiding and extraction.

## Installation
```
$ pip install steg
```

## Usage in Code
```
# Import library
from steg import steg_img

# Hiding
# Select your payload and carrier files
s = steg_img.IMG(payload_path=<payload path>, image_path=<carrier path>)
# Create a new image containing your payload
s.hide()

# Extracting
# Select the carrier image
s_prime = steg_img.IMG(image_path=<path of containing hidden payload>)
# Extract the payload
s_prime.extract()
```
## Commandline Usage
1. Make the steg.py file executable
```$ chmod +x _steg.py```
2. To hide a payload in an image:
```$ ./_steg.py -c <your image file> -p <your payload>```
3. To extract a payload from a carrier:
```$ ./_steg.py -c <your image file>```

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for steg, version 0.1.2
Filename, size File type Python version Upload date Hashes
Filename, size steg-0.1.2-py3-none-any.whl (7.3 kB) File type Wheel Python version py3 Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page